General
-
Target
AsyncClient.exe
-
Size
47KB
-
Sample
241123-nzgbsazrhr
-
MD5
678c7b99496c1e045a6f8a7072f41902
-
SHA1
fbc4bf034a1d4b0b7f0777da3dbf63ba2ea7d5de
-
SHA256
b89c64e6cb8ac56910849b3340322f3ed1aa77be3aee2a9e081ff08819ce43bd
-
SHA512
ac152cb621f2503178f82dfca62816cb13c91551c3f0c181c245117b3a1e2d9dbe022dce109f8e192d74e31c251a857770974f03c5f2b528017fe66e79195fc6
-
SSDEEP
768:QuYH9T3kH1jWUvTqRmo2qbcrFgnNyGzYk5PIqPESVOs0bXbva5XPfG1tRulaADVg:QuYH9T34y2nFg7X2qPJEbDatPfG1tRue
Behavioral task
behavioral1
Sample
AsyncClient.exe
Resource
win7-20240708-en
Malware Config
Extracted
asyncrat
0.5.8
Default
juGfnQMxS4Ze
-
delay
3
-
install
true
-
install_file
Sync.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/s14cUU5G
Targets
-
-
Target
AsyncClient.exe
-
Size
47KB
-
MD5
678c7b99496c1e045a6f8a7072f41902
-
SHA1
fbc4bf034a1d4b0b7f0777da3dbf63ba2ea7d5de
-
SHA256
b89c64e6cb8ac56910849b3340322f3ed1aa77be3aee2a9e081ff08819ce43bd
-
SHA512
ac152cb621f2503178f82dfca62816cb13c91551c3f0c181c245117b3a1e2d9dbe022dce109f8e192d74e31c251a857770974f03c5f2b528017fe66e79195fc6
-
SSDEEP
768:QuYH9T3kH1jWUvTqRmo2qbcrFgnNyGzYk5PIqPESVOs0bXbva5XPfG1tRulaADVg:QuYH9T34y2nFg7X2qPJEbDatPfG1tRue
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-